- Documentojopdf0801-auditing-ibm.pdfenviado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMenviado porJerome B. Agliam
- DocumentoRefining IT Processes Using COBITenviado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMenviado porJerome B. Agliam
- DocumentoRefining IT Processes Using COBITenviado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMenviado porJerome B. Agliam
- DocumentoRefining IT Processes Using COBITenviado porJerome B. Agliam
- DocumentoCentralized Security Managementenviado porJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Center.pdfenviado porJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Centerenviado porJerome B. Agliam
- DocumentoEnhancing Security with an IT Network Awareness Center.pdfenviado porJerome B. Agliam
- DocumentoChanges to Information Processesenviado porJerome B. Agliam
- DocumentoPrinciples of Governanceenviado porJerome B. Agliam
- DocumentoThe IS Auditor's Consideration of Irregularitiesenviado porJerome B. Agliam
- DocumentoImplementing Enterprise Securityenviado porJerome B. Agliam
- DocumentoIT Governance - Why a Guidelineenviado porJerome B. Agliam
- DocumentoRisk Assessment Tools - A Primerenviado porJerome B. Agliam
- DocumentoImplementing Enterprise Securityenviado porJerome B. Agliam
- DocumentoThe Computer Forensics and Cybersecurity Governance Modelenviado porJerome B. Agliam
- DocumentoSpotlight on Governance.pdfenviado porJerome B. Agliam
- DocumentoSpotlight on Governanceenviado porJerome B. Agliam
- DocumentoUsing CAATs to Support IS Auditenviado porJerome B. Agliam
- DocumentoSpotlight on Governance.pdfenviado porJerome B. Agliam
- DocumentoSecurity Architectureenviado porJerome B. Agliam
- DocumentoImpact of SAS No. 94 on Computer Audit Techniquesenviado porJerome B. Agliam
- DocumentoBlack Box Logging and Tertiary Monitoring of Continuous Assurance Systemsenviado porJerome B. Agliam
- DocumentoIT Performance Improvement With COBIT and the SEI CMMenviado porJerome B. Agliam
- DocumentoISACA Standardsenviado porJerome B. Agliam
- DocumentoSimplify and Layer Your Security Approach to Protect Card Dataenviado porJerome B. Agliam
- DocumentoInformation Security From a Business Perspective - A Lottery Sector Case Studyenviado porJerome B. Agliam
- DocumentoRecords Retentionenviado porJerome B. Agliam
- DocumentoHacking Exposedenviado porJerome B. Agliam
- DocumentoSensitive Dataenviado porJerome B. Agliam
- DocumentoA Young Professional’s Guide to Career Success Using Soft Skillsenviado porJerome B. Agliam
- DocumentoDo governments have the right to compel corporations to divulge information if governments see national (or local) safety at stake?enviado porJerome B. Agliam
- DocumentoAuditing Biometrics-based Authentication Systemsenviado porJerome B. Agliam
- DocumentoThe Relevance of IT in Criminal Investigationsenviado porJerome B. Agliam
- DocumentoRisk Management When Implementing ERP Systemsenviado porJerome B. Agliam
- DocumentoFederation of E-governmentenviado porJerome B. Agliam
- DocumentoSecurity and Privacy vs. Computer Forensics Capabilitiesenviado porJerome B. Agliam
- DocumentoWho Audits Auditorsenviado porJerome B. Agliam
- DocumentoJopdf0705 Turning a Securityenviado porJerome B. Agliam
- DocumentoOne of Today’s Most Overlooked Security Threats—Six Ways Auditors Can Fight Itenviado porJerome B. Agliam
- DocumentoPrivacy PKIenviado porJerome B. Agliam
- DocumentoExecutive and Board Roles in Information Securityenviado porJerome B. Agliam
- DocumentoIS Auditing Standards in Malaysiaenviado porJerome B. Agliam
- DocumentoData Warehouse Audits Promote and Sustain Reporting System Valueenviado porJerome B. Agliam
- DocumentoSAS70 Reportsenviado porJerome B. Agliam
- DocumentoeBusiness Trust Inhibitorsenviado porJerome B. Agliam